Abstract

Given the rapid development of cloud computing and cloud storage technology, a growing number of enterprises and individuals use cloud storage services to save data or back up data. In the cloud storage services, although attribute-based encryption can protect users’ data security, the computational cost of key generation, data encryption, and data decryption linearly increases with the complexity of access strategies, which becomes more critical for resource-constrained users. Therefore, this paper proposes a verifiable attribute-based encryption scheme for a fully outsourced ciphertext policy. The scheme can simultaneously realize the functions of key generation, data encryption, and data decryption outsourcing and verify the correctness of the outsourcing calculation results. This scheme can effectively reduce the computational burden of a cloud storage system. The security and verifiability of the scheme are indicated and proved with the random oracle model. The experimental results show that the scheme has the advantages of function and efficiency compared with other schemes. The research results have theoretical and practical significance.

Highlights

  • In the era of big data, large amounts of data are rapidly generated from different sources

  • This paper proposes an efficient and verifiable fully outsourced CPABE scheme. is scheme can simultaneously realize the outsourcing of key generation, encryption, and decryption, verify the correctness of outsourcing calculation results, and build a secure and efficient cloud storage access control model

  • Due to the shortcomings of existing research, this paper proposes a verifiable complete outsourcing CP-Attribute-based encryption (ABE) scheme. e scheme can realize the outsourcing of key generation, encryption, and decryption and verify the correctness of the outsourcing calculation results

Read more

Summary

Introduction

In the era of big data, large amounts of data are rapidly generated from different sources (e.g., smartphones, sensors, and social networks). To solve the data security problem of cloud server users, Lai et al [3] proposed a verifiable outsourcing decryption scheme, which can effectively verify the correctness of cloud computing results by establishing validation labels. To enable end users to effectively control their data access, sensitive data privacy protection mechanisms must be established for cloud storage. E model has low computational efficiency and reliability and cannot adapt to large-scale user access. In this context, this paper proposes an efficient and verifiable fully outsourced CPABE scheme. Is scheme can simultaneously realize the outsourcing of key generation, encryption, and decryption, verify the correctness of outsourcing calculation results, and build a secure and efficient cloud storage access control model This paper proposes an efficient and verifiable fully outsourced CPABE scheme. is scheme can simultaneously realize the outsourcing of key generation, encryption, and decryption, verify the correctness of outsourcing calculation results, and build a secure and efficient cloud storage access control model

Related Work
Research Design
Safety Detection
Proof of Safety
Proof of Verifiability
Experiments and Results
Concluding Remarks
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call